Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe
-
Size
127KB
-
MD5
bc1df8bd42a426f87c7f63c6e7782796
-
SHA1
285296274f0ff41527d426f46b4b5abd4e8e2605
-
SHA256
c3e3ba27bdab5dd37fc0bc8380c025121504d2df5c8067ccfb31278ab46aaf0e
-
SHA512
22431900b58bc43b5eb3ded52c00b2134472339a2740e2483dd163f27820ecd8adc0b2d46a1a9b9f69954f3d398977ae45f3f6d48dc102fcdb1a047f8328ba44
-
SSDEEP
3072:hTAz5wIUQcKFLG6dVY/h27Ol3OwCnE+3D:h/QDLVd37CO/EgD
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2488-1-0x0000000002100000-0x000000000318E000-memory.dmp upx behavioral1/memory/2488-3-0x0000000002100000-0x000000000318E000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc1df8bd42a426f87c7f63c6e7782796_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- System policy modification
PID:2488
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5